The rapid rise in the use of artificially generated faces has significantly increased the risk of identity theft in biometric authentication systems. Modern facial recognition technologies are now vulnerable to sophisticated attacks using printed images, replayed videos, and highly realistic 3D masks. This creates an urgent need for advanced, reliable, and mobile-compatible fake face detection systems. Research indicates that while deep learning models have demonstrated strong performance in detecting artificially generated faces, deploying these models on consumer mobile devices remains challenging due to limitations in computing power, memory, privacy, and processing speed. This paper highlights several key challenges: (1) optimizing deep learning models to operate efficiently on mobile devices, (2) ensuring real-time inference without compromising accuracy, (3) maintaining user privacy when processing sensitive facial data, and (4) addressing the variability in mobile phone cameras, input resolution, and platform limitations across Android and iOS. Furthermore, the increasing sophistication of identity spoofing attacks—such as 3D masks and AI-generated faces—demands more sophisticated, robust, and multimodal detection technologies. The research findings provide a clear roadmap toward practical solutions. By evaluating the latest deep learning architectures, datasets, and anti-spoofing metrics, the study proposes a comprehensive React Native deployment path using TensorFlow Lite and TensorFlow.js to ensure cross-platform compatibility. The proposed system offers a unified classification of identity spoofing attacks and defense mechanisms, along with a structured evaluation framework that compares on-device processing with server-side detection. The results demonstrate that optimized models can achieve high accuracy, low false accept/rejection rates, and sub-second processing speeds on mobile devices. Ultimately, the study provides practical design guidelines for building robust, privacy-preserving, efficient, and real-world consumer-grade fake face detection systems.
Forty-eight aborted women (Iraqi Arab Muslims) at the first trimester with a serological evidence of toxoplasmosis were investigated. Two age- and ethnic-matched control groups were included: 40 aborted women due to accidental events (Control I), and 40 unmarried (virgin) women (Control II). The subjects were evaluated for the following parameters: HLA-class I antigens (A, B and Cw), blood groups, total and differential counts of leukocytes, lymphocyte subpopulations (CD3+, CD4+ and CD20+ cells), phagocytosis of heat-killed yeast (phagocytic index and NBT index), and total serum levels of immunoglobulins (IgA, IgG and IgM) and complement components (C3 and C4). The HLA-A2 and -Cw8 antigens were significantly increased in the patien
... Show MoreAbstract: In this work we demonstrate and investigate the optical pulse propagation in a photonic band gap fiber Bragg grating (FBG). The light propagates in opposite direction in FBG is explained and discussed by a Coupled Mode Theory (CMT). The photonic band gap (stop band gap) is created by fabricated, a Bragg grating in optical fiber. The results show the pulse spectrum falls entirely within the stop band gap, the entire pulse is reflected by the grating, while when the pulse spectrum is outside the stop band gap the pulses will transmitted through the grating. The group velocity (VG) becomes zero at the edges of the stop band and group velocity dispersion β2 is anomalous on the shorter side of stop band gap whereas β2 for uniform fi
... Show Moreplaque forming assay was used enumerate the number of plaque forming cells of anti-HBc in eight patintes with chronic hepatitis and eight health
Transference numbers of the aqueous zinc chloride and zinc sulphate solutions have been measured for the concentrations 0.03, 0.05, 0.07, 0.09 and 0.1 mol.dm-3at 298.15K, by using the modified Hittorf method. The dependence of transference number on concentration of each electrolyte was also investigated in an attempt to explain the value of the limiting transference number. The Longsworth method has been used for the extrapolation of zinc transference number in aqueous solutions, using the values of the limiting transference numbers of the appropriate values of the limiting equivalent conductance, it was possible to determine the corresponding values of the limiting ion conductance for the cations and anions of the electrolytes. The
... Show MoreBackground: Periodontal diseases are initiated by microbial plaque, which accumulates in the sulcular region and induces an inflammatory response. The Receptor activator of nuclear factor-kappa B ligand / osteoprotegerin (RANKL/OPG) axis is involved in the regulation of bone metabolism in periodontitis, in which an increase in receptor activator of nuclear factor-kappa B ligand or a decrease in osteoprotegerin can tip the balance in favor of osteoclastogenesis and the resorption of alveolar bone that is the hallmark of periodontitis. This study was performed to investigate the role of salivary levels of RANKL and OPG in pathogenesis of chronic periodontitis. Subjects and Methods: Fifty five subjects with chronic periodontitis with ages rang
... Show MoreThe concept of insurance policy is one of the concepts that expresses a way to face the risks that a person is exposed to in the field of his life. It is a system that involves a prior agreement between two parties through which the risk is transferred from the second party (the insured) to the first party (the insurer) in return for paying an amount Calculated was able to cover the potential loss according to certain percentages agreed upon between the two parties, and that the main goal of any scientific analysis of the risk is to choose the most appropriate policy or method to confront it, by identifying the risks and ways to address them, and the main goal is to reduce losses and limit the possibility of their occurrence.
In
... Show MoreImage segmentation can be defined as a cutting or segmenting process of the digital image into many useful points which are called segmentation, that includes image elements contribute with certain attributes different form Pixel that constitute other parts. Two phases were followed in image processing by the researcher in this paper. At the beginning, pre-processing image on images was made before the segmentation process through statistical confidence intervals that can be used for estimate of unknown remarks suggested by Acho & Buenestado in 2018. Then, the second phase includes image segmentation process by using "Bernsen's Thresholding Technique" in the first phase. The researcher drew a conclusion that in case of utilizing
... Show More